Login / Signup

Detecting Insider Malicious Activities in Cloud Collaboration Systems.

G. S. SmrithyAlfredo CuzzocreaRamadoss Balakrishnan
Published in: Fundam. Informaticae (2018)
Keyphrases
  • malicious activities
  • distributed systems
  • security issues
  • information systems
  • face recognition
  • low cost
  • computer systems
  • intrusion detection system
  • online social networks
  • insider threat